Author of the publication

Detecting Self-mutating Malware Using Control-Flow Graph Matching.

, , and . DIMVA, volume 4064 of Lecture Notes in Computer Science, page 129-143. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Smart Fuzzer for x86 Executables., , , and . SESS@ICSE, page 7. IEEE Computer Society, (2007)A methodology for testing CPU emulators., , , , and . ACM Trans. Softw. Eng. Methodol., 22 (4): 29:1-29:26 (2013)Testing system virtual machines., , , and . ISSTA, page 171-182. ACM, (2010)Conqueror: Tamper-Proof Code Execution on Legacy Systems., , and . DIMVA, volume 6201 of Lecture Notes in Computer Science, page 21-40. Springer, (2010)Code Normalization for Self-Mutating Malware., , and . IEEE Secur. Priv., 5 (2): 46-54 (2007)Automatic Generation of Remediation Procedures for Malware Infections., , , , , , and . USENIX Security Symposium, page 419-434. USENIX Association, (2010)A Layered Architecture for Detecting Malicious Behaviors., , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 78-97. Springer, (2008)Testing CPU emulators., , , and . ISSTA, page 261-272. ACM, (2009)How Good Are Malware Detectors at Remediating Infected Systems?., , and . DIMVA, volume 5587 of Lecture Notes in Computer Science, page 21-37. Springer, (2009)Live and Trustworthy Forensic Analysis of Commodity Production Systems., , , and . RAID, volume 6307 of Lecture Notes in Computer Science, page 297-316. Springer, (2010)